Hacker claims to be selling C-suite executives' Microsoft credentials

Access to "hundreds" of accounts is being sold on the dark web for up to $1,500

Hackers are selling access to C-suite executives' Microsoft accounts for anywhere between $100 and $1,500, according to reports.

The credentials are being sold on the dark web by a Russian-speaking hacker on a forum called Exploit.in, ZDNet reports. On sale are email accounts with their passwords for Office 365 and Microsoft accounts, ranging from CEO, COO, and CFO to financial directors and accountants.

The report claims that a source in the cyber security community agreed to contact the hacker and managed to obtain samples that confirmed the validity of the data. Valid credentials for two accounts were obtained; a CEO of a US medium-sized software company and a CFO of an EU-based retail store chain.

The source has since attempted to notify the companies of the suspected breach, as well as two other companies for which the seller published account passwords to prove they have valid data for sale. These were details for someone at a UK business management consulting firm and the president of a US apparel and accessories maker.

The hacker claimed to have hundreds of account details for sale but did not say how they managed to obtain the data in the first place.

Related Resource

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Priviledged Access Managenment whitepaperDownload now

According to information provided by cybersecurity firm KELA, the same hacker expressed an interest in buying "Azor logs”. These logs are data collected from computers infected with AzorUlt malware.

This Trojan is designed to steal data from systems, such as saved passwords from browsers and email, files, and message histories from Skype.

Raveed Laeb, a product manager at KELA, told ZDNet that cyber criminals can exploit corporate email credentials in many ways.

“Attackers can use them for internal communications as part of a ‘CEO scam’ - where criminals manipulate employees into wiring them large sums of money; they can be used in order to access sensitive information as part of an extortion scheme; or, these credentials can also be exploited in order to gain access to other internal systems that require email-based 2FA, in order to move laterally in the organization and conduct a network intrusion,” he said.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

Botnet targets vulnerable Microsoft Exchange servers
botnets

Botnet targets vulnerable Microsoft Exchange servers

23 Apr 2021
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

22 Apr 2021
What is hacktivism?
hacking

What is hacktivism?

22 Apr 2021
Geico data breach leads to stolen driver’s license numbers
data breaches

Geico data breach leads to stolen driver’s license numbers

21 Apr 2021

Most Popular

REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Samsung Galaxy S21 Ultra review: Ultra in every sense of the word
Mobile Phones

Samsung Galaxy S21 Ultra review: Ultra in every sense of the word

22 Apr 2021